Assessment Task 2: WAN specification projectTask summaryIn this assessment task, you are required to identify the best way computers and local area networks(LANs) can be connected to make a wide area...

1 answer below »
Assessment Task 2: WAN specification projectTask summaryIn this assessment task, you are required to identify the best way computers and local area networks(LANs) can be connected to make a wide area network (WAN) for a case study organisation.This assessment is to be completed in the simulated work environment in the RTO.Required• Access to textbooks and other learning materials• Computer with Microsoft Office and internet access• LAN Design (see scenario information)• Equipment specifications• Vendor product catalogues such as at:o Cisco: https://www.cisco.com/c/en_au/products/routers/index.htmlo Fortinet products: https://www.fortinet.com/products.htmlo D-Link: https://www.dlink.com.au/home-solutions/connectivity/routerso TPLINK: https://www.tp-link.com/au/home-networking/wifi-router/o Ubiquiti products https://www.ui.com/edgemax/edgerouter-liteTimingYour assessor will advise you of the due date of these submissions.Submit• WAN Specification Report• WAN Design Screen ShotsAssessment criteriaFor your performance to be deemed satisfactory in this assessment task, you must satisfactorilyaddress all of the assessment criteria. If part of this task is not satisfactorily completed, you will beasked to complete further assessment to demonstrate competence.Re-submission opportunitiesYou will be provided feedback on their performance by the Assessor. The feedback will indicate if youhave satisfactorily addressed the requirements of each part of this task.If any parts of the task are not satisfactorily completed, the assessor will explain why, and provideyou written feedback along with guidance on what you must undertake to demonstrate satisfactoryperformance. Re-assessment attempt(s) will be arranged at a later time and date.You have the right to appeal the outcome of assessment decisions if you feel that you have beendealt with unfairly or have other appropriate grounds for an appeal. You are encouraged to consultwith the assessor prior to attempting this task if you do not understand any part of this task or if youhave any learning issues or needs that may hinder you when attempting any part of the assessment.Assessment Task 2 Instructions as provided to students Carefully read the following: Grow Management Consultants is a leadership consultancy business based in Sydney. Recently the company has expanded and set up another office in Brisbane. Due to the expansion, the company needs to implement a Wide Area Network (WAN). Currently the company uses computers with a Windows Operating System and Office 365. Files are currently shared via Dropbox, but the company would like to move towards an Intranet system as part of the WAN. The current LAN includes 2 routers, 2 switches and 75 computers. The same equipment will be repeated in the Brisbane office. File types shared between computers include videos (part of the company’s webinar offerings) and documents including text and images such as marketing materials. Skype is also used for meetings with clients and internally. Due to this the company requires a WAN. The company’s budget for this is $30,000. Complete the following activities: 1. Identify WAN needs and create a WAN specification. You are required to review the network topology diagram for the existing office in Sydney, as well as the new office in Brisbane. Based on your review of the network topology diagram, you are required to develop a WAN Specification that includes: • A description of the current LAN that is in place in each office. • Required LAN, WLAN and VPN segments for the proposed WAN. Make sure you identify the segment, as well as what should be included in each segment (use screen shots to show your proposed segments). • An explanation on how the company’s physical environment impacted on the WAN design created. • Your estimate of the bandwidth required according to the scenario information and based on expected traffic content and volume. You should also include the download and upload speed required. • An outline of the various components of the proposed WAN network and that includes the device/software, resource type, segment/level and functions. Use the table in the WAN Specification Template to document your answers. • Vendor options and costs for each of the components you are proposing (include at least three options). • An outline of the most appropriate WAN design taking into account budget considerations, reliability and bandwidth. • A design for redundant links in the proposed WAN connectivity for link backup purposes, in case the main link is disrupted. Use WAN Specification Template to document your report. Ensure you include screen shots of eachpart of the WAN design.
Answered Same DayJun 17, 2021ICTNWK517Training.Gov.Au

Answer To: Assessment Task 2: WAN specification projectTask summaryIn this assessment task, you are required to...

Vinay answered on Jun 24 2021
152 Votes
Task 1
1 “A local area network (LAN) can be a variety of laptops and computer peripherals (disk storage devices, printers) connected by high-speed data centers between buildings or adjacent buildings. Because LAN originated as ways of interconnecting multiple devices between a companies, which can enable the native process, while giving access to different applications connected to the transmission of messages between network networks, while not using a laptop host central access to various file stores.
.
· Small LAN One is to circulate a token or slots round the ring: a station can transmit when, and only when, it holds the token. This is simple and efficient, and should not be thought of as greatly decreasing the capacity of the network, because the token circulates extremely fast.
· Large LAN, the opposite technique is employed by LANs on the local network. local network could be a public specification resulting from preliminary work by Xerox Corporation; the details were printed together by Xerox, digital instrumental
ity. In Ethernet-type networks, access is controlled by a technique called Carrier Sense Multiple Access with Collision Detection (CSMA / CD).”(Stokes, 1983)
· “A WAN can be an information communication network that operates across the geographic scope of a local area network. WANs face problems with LANs in several ways. While a local network connects computers, peripherals and alternative devices during a single building or other small geographic area, a WAN allows the transmission of knowledge across greater geographical distances. In addition, the associate-level company must purchase a WAN service provider to use the WAN operator's network services. LANs usually measure hand in hand by the company or organization that uses them. WANs use resources provided by a service provider or operator, such as a telephone or cable company, to connect a company's locations to all alternatives, locations of alternative organizations, external services and remote users. WANs offer network capabilities to support the spread of mission-critical traffic, such as voice, video and data.”(Kauffman, 2008)
· “VPN stands for Virtual Private Network: A VPN is a private network in the sense that it carries controlled information, protected by various security mechanisms, between known parties. VPNs are only virtually private, however, because this data actually travels over shared public networks, rather than fully dedicated private connections.
a) Remote Access VPNs: Remote Access VPN is also called virtual private dial-up networks (VPDNs).These are use to-LAN connections used when employees of a company who are in remote locations need to connect to the company's private network.
b) Site to Site VPNs: A site-to-site VPN allows offices at multiple fixed locations to establish secure connections with each other over a public network such as the Internet.”(Bhattarai, 2016)
· Intranet-based: “If a company has one or more remote locations that it wants to post on an extremely large remote non-public virtual VPN network, three unique non-public networks will produce an associated grade computer network VPN to connect all separate local networks for a WAN. Extranet-based - once a company incorporates a close relationship with another company (such as a partner, provider or customer), it will create an associated-grade extranet VPN that connects these companies' LANs. This extranet VPN allows companies to appear in an extremely secure shared network configuration and prevent access to separate intranet.”(Bhattarai, 2016)
· Virtual LANs (VLANs) “Allows an extended computer network to be partitioned into many ostensibly separate LANs. every network of virtual computers receives an AN identifier (sometimes called a color) and packets travel only from one section to another if each segment has an equivalent identifier. This has the impact of limiting the number of segments on an extended computer network that can receive any broadcast packet. a nice feature of VLANs is that you can change the network topology without moving any wires or changing all addresses.”(Bhattarai, 2016)
2. “The electronic equipment connects to a cable / wire of the skin, transferring information from the network (email, You Tube videos, Google search results, files) from anywhere on the planet. a single wire that goes from your electronic equipment to your PC delivers your requests and net activities to your PC and monitor. just in case of questions, you cannot simply connect this cable from your network service provider directly to your PC.”
3. WLAN: “Wireless technology helped simplify the network, allowing multiple computer users to share resources simultaneously in a home or business without additional or intrusive cabling. These features can include a broadband Internet connection, network printers, data files and even streaming audio and video.”(U.S Robtics Corporate Author, 2014)
4. “The basics of IP address works to create an IP addressing plan for your network. This guide is a concise reference on IP addressing best practices, including
The basic concepts of IP addressing
· The IP addressing plan used in the Cisco Smart Business Architecture (SBA) Foundation lab network
· Guidance on how to add new services to an existing network
· Assistance planning for the acquisition of a company that has a different IP address space
· A plan for expansion after running out of IP address space
· An IP address migration path for growth
· An IP addressing plan that can be used in midsize networks as a template for customer deployments.”(Cisco Systems, 2011)
“A router does two special things by leeching on to your modem. It can take the digital signal from your modem (which the modem gets from the cable company's cable) and share it with (route it to) other computers in the house. You now have a computer network at home. In order to do this, the router monkeys with and modifies the IP address on your computer(s). Just by doing that, it automatically makes it hard for hackers to now get at your computer. In fact, it's harder to target any specific computer linked to the router. A wireless router allows you to connect your Internet connection at home with any wireless device, such as a laptop, Smartphone or iPad.”
5. “Packet-switched networks may establish routes through the switches for particular end-to end connections. These routes are called virtual circuits (VC). A VC is a logical circuit created within a shared network between two network device WAN users does not use the fixed bandwidth available on dedicated, switched or permanent circuits, because the data flow fluctuates. Communications providers have data networks available to serve these users. In packet-switched networks, data is transmitted in frames, cells or labeled packets. Communication links switched by Frame Relay, ATM, X.25 and Metro Ethernet packets”(Kauffman, 2008)
6. “A router does two special things using the modem. It can take the digital signal from the modem (which the modem receives from the cable from the cable company) and share it with (forward to) other computers in the house. You now have a computer network at home. To do this, the router monitors and modifies the IP address on your computer; doing so automatically makes it more difficult for hackers to reach your computer. In fact, it is more difficult to target any specific computer linked to the router. A wireless router allows you to connect your Internet connection at home with any wireless device, such as a laptop, smartphone or iPad.”
7. Three types of modems
· Directional capacity: (half duplex modem and full duplex modem.)
An electronic device allows transmission in one direction at a time. If a carrier is detected on the road by electronic equipment, I offer a signal from the incoming carrier to DTE through an oscillation signal from its digital interface. A full duplex electronic device allows synchronous transmission in each direction. Therefore, there are area 2 units on the road, one at the exit and one at the entrance, wired and wireless modems
· Connection to the line:
2-wire electronic equipment 2-wire modems use an equivalent wire attempt for outgoing and incoming operators. A chartered 2-wire connection is generally cheaper than a 4-wire association, as only 1 attempt of wires is extended to the subscriber's premises; the information association established in the workplace is also a 2-wire association”
· Transmission mode: asynchronous modem and synchronous modem:
Signed modems can handle data bytes with start and stop bits. There is no separate signal or time clock between modem and DTE. Synchronous modems can handle a continuous stream of data bits, but it requires a clock signal. The data bits are always synchronized with the clock signal. There are separate clocks for the data bits being transmitted and received. For synchronized transmission of data bits, the DTE can use its internal clock and provide it to the modem.
8. Routed Protocols Working: The transportation of data across a network is the responsibility of the routed protocols, and In other words, protocols that transfer data packets from one host to another across router(s) are routed protocols.
9. Routing protocols working: “Routing protocols permit routers to appropriately direct data from one place to another. When a node wants to transmit real time applications (video or voice) over IP then it must have to pass through a router. For transmission of real time applications, real time transport protocol (RTP) is used and the session is established between two remote stations through session initiation protocol (SIP) or H.323. Except, these real time transmission protocols, some routing protocols are also used which route the real time applications to its destination. These are: RIP, OSPF, IGRP and EIGRP”(IKram Ud Din Saeed Mahfooz & Muhammad Adnan, 2010)
10. “The TCP/IP (transmission control convention/Internet convention) suite of protocols is the situated of conventions used to impart over the web. It is additionally broadly utilized on numerous authoritative systems because of its adaptability and wide show of usefulness gave. Microsoft who had initially built up their own particular arrangement of conventions now is the entire more broadly utilizing TCP/IP, at first for transport and now to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here